CN105874767B - Detecting anomalous activity from accounts of online services - Google Patents

Detecting anomalous activity from accounts of online services Download PDF

Info

Publication number
CN105874767B
CN105874767B CN201480069416.7A CN201480069416A CN105874767B CN 105874767 B CN105874767 B CN 105874767B CN 201480069416 A CN201480069416 A CN 201480069416A CN 105874767 B CN105874767 B CN 105874767B
Authority
CN
China
Prior art keywords
event
date
account
profile
past
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201480069416.7A
Other languages
Chinese (zh)
Other versions
CN105874767A (en
Inventor
A·萨多夫斯基
R·拉尔卡卡
V·夏尔马
R·拉加古帕兰
A·麦克劳德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Technology Licensing LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Technology Licensing LLC filed Critical Microsoft Technology Licensing LLC
Publication of CN105874767A publication Critical patent/CN105874767A/en
Application granted granted Critical
Publication of CN105874767B publication Critical patent/CN105874767B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Human Computer Interaction (AREA)
  • Debugging And Monitoring (AREA)
  • Alarm Systems (AREA)

Abstract

Anomalous activity is detected using event information received from an account in an online service (110). Typically, abnormal activity is detected by comparing a baseline profile (155) with a latest profile (165), wherein the baseline profile (155) includes past event information for an account of the online service (110) and the latest profile (165) includes latest event information for the account. Abnormal activity is detected when the latest profile (165) shows that one or more events occur more frequently than the occurrence of the event in the associated baseline profile (155). The events recorded and used in anomaly detection may include all or a portion of the events monitored by the online service (110). One or more reports (130) may also be automatically created and provided to one or more users to show activities that may be considered anomalous activities.

Description

Detect the abnormal movement of the account from online service
Background technique
The mode and expected mode that abnormality detection is used to determine when in data mismatch.For example, credit card company can Help to detect fraudulent activity related with the credit card of client to use abnormality detection.Online service can create rule Then, for detecting abnormal movement when network flow is more than predetermined threshold.Detecting abnormal movement associated with online service can It can be challenging and time-consuming.For example, usually related in the presence of the operation with online service that may need to analyze Extremely large number data.Instead of handling in above-mentioned mass data, many online service detection abnormal movements are by true When fixed predefined event occurs on the single or several machine of the online service.For example, the predefined event can respond It is more than some scheduled level in the network flow of online service and occurs, or when a large amount of processes starts in a short period of time Occur.
Summary of the invention
The invention content is provided to introduce the selected works of the concept of reduced form, the concept will be in specific implementation below It is further described in mode.The invention content is not intended to the key feature or substantive characteristics of mark present subject matter, also non-purport For determining the protection scope of present subject matter.
Abnormal movement is detected using the event information that movable account monitors is executed from online service.It is logical Often, abnormal movement is detected by determining when baseline profile and newest profile difference, and wherein baseline profile indicates to be somebody's turn to do " normal " activity of line service, newest profile indicate " current " activity of the account in the online service.For example, when one Event (for example, creation account event) in newest profile more compared to the incidence for creating an account event in baseline profile When continually occurring, abnormal movement can detecte.Detection abnormal movement used in event information, may include by this All events or part of it of line service monitoring.For example, the event for abnormality detection may include: security incident (example Such as, change any event of license, for example, creation account, the license for changing one or more accounts, login the online service or Person publishes the online service ...) all or part of it and other types of event (for example, system event, hardware thing Part, etc.).Authenticated user can configure the event to be monitored, and/or for the thing of one or more event Part can be automatically selected.It may include the complete of the account of the online service to search abnormal movement and monitored account Portion or a part.For example, being to search abnormal movement and monitored account to can be operator account (such as it is other for being licensed The account that user or user group create an account, modifies account and deletes account) or other type of account (for example, user Account, privileged account etc.).In response to detecting abnormal movement, different activities can be executed.For example, some account can be prevented Family executes operation, can lock account, can automatically generate it is one or more report and be supplied to one or more users with Showing may be considered as activity of abnormal movement, etc..Different types of report can be generated.For example, a report can be with Ranking is carried out to account based on the grade of the abnormal movement detected, and another report can be provided in these accounts One or more more detailed informations.
Detailed description of the invention
Fig. 1 shows the general introduction of the system of the abnormal movement for detecting the account from online service;
Fig. 2 shows the more detailed systems of the abnormal movement for detecting the account from online service;
Fig. 3 is shown including detecting the event information used when the abnormal movement of the account in online service and thing The different profiles of part weight;
Fig. 4 shows the exemplary graphical user for watching and configuring event related with abnormality detection;
Fig. 5 shows the detected abnormal movement of one or more accounts in the online service for showing detection Illustrative report;
Fig. 6 is shown for abnormal living in detection online service by the way that baseline profile to be compared to newest profile Dynamic process;
Fig. 7 shows the process for configuring and storing the event information in baseline profile and newest profile;
Fig. 8 shows the exemplary on-line system for detecting abnormal movement;And
Implementation of the invention wherein can be implemented to providing in Fig. 9, Figure 10 A, Figure 10 B and Figure 11 and associated description The discussion of the various operating environments of example.
Specific embodiment
Due to may be loaded into log event it is large number of, online service is usually from the single machine in the service A relatively small subset of the event of loaded log is checked in device (or a small amount of machine), to detect abnormal movement.For example, not It is all to check the event from each of online service machine, but online service selects one or two machine To monitor to search abnormal movement.In addition, online service can also establish hard coded rules to detect abnormal movement.For example, Line service can create rule to identify certain types of abnormal movement.According to an embodiment of the invention, not being that creation is individual Rule detects abnormal movement, but by anomaly detector based on the event monitored and the thing obtained from different calculating equipment Account in part and the online service automatically detects abnormal movement.The account from on-line system monitored can be used Any number of event at family detects abnormal movement, without creating individually rule.Detecting abnormal movement is not by looking into It looks for the scheduled event of generation or situation and determines when that certain types of abnormal movement is occurring, but by that will indicate The event that the frequency of the event of " normal " behavior of the online service and the online service occur during nearest a period of time Frequency be compared.When the frequency of event is different between baseline profile and newest profile, can indicate abnormal living It is dynamic.Then, which is provided to one or more users in the form reported.According to one embodiment, include with The report of the related information of the abnormal movement detected in the online service is delivered.
Various embodiments will be described wherein identical appended drawing reference indicates identical element referring now to attached drawing.
Fig. 1 shows the general introduction of the system of the abnormal movement of the account for detecting online service.As shown, system 100 include online service 110, anomaly detector 26, baseline profile 155, newest profile 165, display 115 and display 125.
Anomaly detector 26 is configured as detecting the abnormal movement that account associated with online service 110 is occurred.It is different Normal activity is the activity deviated with the expected activity of the online service or normal behaviour.For example, in response to online from this For following movable uncommon high amount of request, anomaly detector 26 can detecte abnormal living account in service It is dynamic: creation new account;Change license;Start-up course etc..It is different in order to determine when the abnormal movement of online service 110 occurs Normal detector 26 determines when the frequency of the event in the newest profile 165 of the frequency departure of the event stored in baseline profile 155. For example, baseline profile 155 can indicate during the normal operating of online service 110, in two accounts of creation in typical one day. But in today, newest profile 165 shows that the certain accounts in the online service create ten different accounts.In response to inciting somebody to action Baseline profile 155 is compared with newest profile 165, and determine these frequencies be different, anomaly detector 26 determine Abnormal movement has occurred in line service 110, therefore generates the exception reporting 130 for showing on display 125.
In present exemplary, the display of exception reporting 130 includes the message for the information for showing the abnormal movement (for example, " account Family 1 creates 10 new accounts "), also show normal activity (for example, " create 2 accounts be normal activity).It can be by this report One or more users are supplied to, to show the activity for being considered as abnormal movement.Different reports can be generated.For example, one A report can carry out ranking to account based on abnormal movement, and another report provides the more detailed of one or more accounts Information.
Anomaly detector 26 can be used online service monitor (for example, be loaded into log) event whole or one Point, to detect abnormal movement.It is not only to be supervised to one or two the different event occurred in single calculating equipment It surveys, and determines when to meet scheduled situation, but the arbitrary number in the online service can be used in anomaly detector 26 The event of any number of loading log of the account of amount detects abnormal movement.For example, anomaly detector can be used at this Each of security incident of the loading log occurred in online service (for example, changing any event of license, such as creates account Family, the license for changing one or more accounts etc.), to detect abnormal movement.
According to one embodiment, the user of authorization can detect thing used in abnormal movement with arrangement abnormalities detector 26 Part.In current example, display be used for event configuration 117 graphic user interface (GUI), and its be configured as from Family receives EventSelect and configuration information.For example, user, which can choose online service, is directed to what one or more accounts were monitored The all or part of event.In present example, display 115 shows that authenticated user selected in detection abnormal movement When, using changing license event and increasing account event, without the use of logining event.Further, it is also possible to receive other configurations letter Breath, such as, but not limited to: weighted information;Summarize profile etc. (referring to attached drawing and following relevant discussion).When user does not refer to When configuring surely, anomaly detector 26 uses default algorithm weighting procedure.According to one embodiment, default algorithm weighting procedure is based on The incidence of event in baseline profile distributes higher weight (that is, being more likely to send out to the determining event less occurred It is raw abnormal).
Online service 110 can be service based on cloud and/or the service based on enterprise, be configured to supply such as raw The service of force of labor service (for example, message, cooperation, electrical form, document, presentation, chart etc.) etc.It is provided below about different The more details often detected.
Fig. 2 shows the more detailed systems 200 of the abnormal movement in the account for detecting online service.
As shown, system 200 include using 262, using 272, tablet computing device 260, calculate equipment 270 and online Service 110, wherein online service 110 includes anomaly detector 26, baseline profile 210, newest profile 220, account 230, calculates Equipment 240 and log 250.
As discussed above, anomaly detector 26 be configured as by using monitoring from account 230 (its with Line service 110 is associated) event information, to detect abnormal movement.For example, in online service for search abnormal movement and by The account of monitoring can be operator account, and it is that other users or user group create an account, modify account that this account, which has license, With deletion account.In addition it is also possible to monitor abnormal movement to other accounts (for example, user account).
According to one embodiment, anomaly detector 26 passes through the frequency for the past event being included in baseline profile 210 It is compared with the frequency for including up-to-date event in newest profile 220, to detect abnormal movement.Profile is (for example, baseline is simple Shelves perhaps newest profile) include the event information for the single account of online service or may include from the online service All accounts or a part of account event information obtained summarized.When the up-to-date event information of an account show with The incidence of the event recorded in baseline profile is compared, and when one or more events more frequently occur, anomaly detector 26 can To detect abnormal movement.
Various methods can be used in anomaly detector 26, to determine when that abnormal movement has occurred in online service 210. According to one embodiment, anomaly detector 26 is directed to each account associated with profile or account's group, creates a frequency Rate profile.Anomaly detector 26 will be used for the frequency profile of event associated with baseline profile, be used for and newest profile phase The frequency profile of associated event is compared.For example, when frequency profile associated with newest profile indicates " with baseline profile Compared during indicated " normal " operation, one or more events more frequently occur " when, then detect abnormal movement.
According to one embodiment, for each of profile event is included in, to determine frequency.For example, for the ease of It for the sake of explanation rather than is intended for limiting, it is assumed that four different events of monitoring.Baseline profile shows event 1 and occupies these The 10% of event, event 2 occupy the 25% of whole events, and event 3 occupies the 50% of these events, and event 4 occupies these events 15%.Newest profile is shown: event 1 occupies the 20% of these events, and event 2 occupies the 15% of whole events, and event 3 occupies The 50% of these events, event 4 occupy the 15% of these events.It is different in response to baseline profile to be compared with newest profile Normal detector 26 detects the activity of being abnormal, this is because compared with baseline profile, in newest profile, the frequency of event 1 It is bigger.Other methods of the abnormal movement of the account in detection online service can be used.It is, for example, possible to use other statistics sides Method, such as: the number that each event occurs in predetermined period of time is compared, the frequency of some events is carried out Summarize, and the frequency after summarizing is compared;Or use some other statistical method.
According to one embodiment, different weights can be distributed to different events, so that: the tool in account monitored There is the increase of the incidence of bigger weight event, before the incidence increase for the event not weighted significantly, would indicate that different Often activity.According to one embodiment, bigger weight can be automatically or manually distributed to the event of less frequent generation, So that the increase of the incidence of the event indicates abnormal movement more quickly.For example, can will be stepped on compared with creating account event Incoming event is set as lower weight, this is because logining event is usually the common event in online service.Can automatically and/ Or manually distribute these weights.
After anomaly detector 26 detects abnormal movement, different movements can be executed.For example, can automatically create One or more reports (for example, exception reporting 265) are built and delivered, one or more accounts can be locked, so that future activity Stop, certain movements generation etc. in online service can be prevented.Report can be generated, and provide it to one or more User, to show the activity for being considered as abnormal movement.Different reports can be generated.For example, exception reporting 265 can be based on Abnormal movement detected to carry out account ranking, and another report provides the more detailed information of one or more accounts (referring to fig. 4 with relevant discussion).
Baseline profile 210 includes one or more baseline profiles, and wherein these baseline profiles include and online service 110 " normal " or " typical case " operates related event information.Each baseline profile 210 these baseline profiles 210 each In include event information (for example, one week, two weeks, January, two months etc.) for one section of predetermined time of the online service.It can With according to scheduled scheduling (for example, daily, weekly etc.) or using some other method (for example, in request), to base Line profile 210 is updated.According to one embodiment, authenticated user can be only fitted to the event letter for including in baseline profile Breath, the time cycle of event information for including in baseline profile and scheduling is updated.For example, authenticated user can One or more different types of accounts of the online service are stored in upper one month event information with Configuration baseline profile, and It is updated daily.
Newest profile 220 includes one or more newest profiles, and wherein these newest profiles include and online service 110 The related event information of the event occurred within newest a period of time.For example, newest profile may include: the service at upper one day Within, caused by the activity that occurred within upper several hours of the online service for the event information of one or more accounts Etc..In general, the event information for including in newest profile is newest compared with the event information for including in baseline profile 210 Event information.The up-to-date event information can be used to update baseline profile.For example, can be other with every day or according to some Time cycle updates baseline profile using up-to-date event information.With this mode, baseline profile may include: online service 110 In account caused by event a receding horizon (for example, upper January, upper two month, upper March etc.) in event Information.
Log 250 is configured as event information caused by one or more accounts of storage online service 110.According to one A embodiment, log 250 store the record of event (it includes account's security incident generated in online service).For example, Log 250 includes: the one or more accounts occurred in one or more calculating equipment 240 associated with online service 110 The log in/log out activity generated of family 230 and other and security-related event record.According to one embodiment, in log The daily record data stored in 250, comprising: information specified by the audit strategy of system.In general, authenticated user can configure this System records different event and different types of event in log 250.
When detecting the abnormal movement in online service, the event of many types can be loaded into log by anomaly detector And it uses.Some Exemplary types of the event of log can be loaded into, comprising: account's log-in events, account management event, catalogue Service access event, object accesses event, tactful change, privileged operation, system event etc..For example, creating, visiting each time When asking, change or delete an object, event can be generated and the event is loaded into log.It can be with when detecting abnormal movement It is loaded into the list of log and the more detailed event used, can be found in the discussion of Fig. 8.
Fig. 3 show for detect the event information of event used when the abnormal movement of the account in online service and The different profiles of weighting.
As discussed herein, each profile include for event that is monitored and/or being loaded into log whole or The event information of a part, wherein these events are derived from the account of online service.Following profile is only shown for example Property purpose, rather than it is restrictive.Although each shown profile shows four kinds of different events, can be in profile In include more or less event.For example, a profile may include hundreds of or thousands of kinds of different types of events.
What profile 310 showed multiple accounts for the online service summarizes baseline profile.For example, profile 310 can be with Including the event information that generates from a variety of different types of accounts being located in online service or its may include certain kinds The all or part of the account of type.According to one embodiment, creation includes each operator account's of online service Summarize profile.As discussed above, term " operator account " reference be licensed created an account for other users or user group, It modifies account and deletes the account of account.It can also include the other types of account (for example, user account) in online service.
In present example, profile 310 includes for four kinds of different events (event 1, event 2, event 3 and event 4) Event information.It though it is shown that four kinds of events, but may include less event or more events to detect abnormal movement. For example, all or part that these events may include security incident (is directed to the more detailed of security incident referring in Fig. 8 The discussion of list) and any other event (for example, machine movement, user action etc.) that can monitor of online service.Letter Each event for including in shelves includes different event information.The event information may include such as following information: event Type;The time of generation event;Any account generates the event;Result of the event etc..For example, event can be with It is that account 2 in the process that morning 11:06 starts starts event, specific process is caused to be activated.According to another embodiment, The profile may include: each monitored event within specified a period of time (for example, within one day, one week etc. Deng) occur number.
Shown percentage, shows these things under the event information in profile 310 and profile 340 and 370 The percentage that each of part event occurs.Current in the example for summarizing profile 310, event 1 20% when Between occur, event 2 5% time occur, event 3 50% time occur, event 4 25% time occur.It is logical Often, the common event that the event more frequently occurred usually such as logs on to service, publishes the service etc..
As described above, each event can be with other events (wherein, when detecting any abnormal movement, to these its Its event is monitored and uses) weight same or differently.For example, identical value can be weighted to each event (for example, 1), or be weighted using some other standard.According to one embodiment, which is based on being somebody's turn to do in profile The frequency of event.For example, compared with the event more frequently occurred, can weight for the event for less frequently occurring into Row larger weights.Compared with the common event for such as logining event or Logout Events etc, usually infrequently occur Event (for example, creating an account) can be considered as showing abnormal movement to a greater degree.According to one embodiment, by by highest The percentage of frequency event divided by each of profile event generation percentage, to automatically determine for each The relative weighting of a event.In the present example shown by profile 310, the weighting automatically determined be will lead to: be used for event 3 Weight compare, 1 higher 2.5 times of weight, and compared with for the weight of event 3,2 higher 10 times of weight, and be used for event 3 Weight compare, 4 higher 2 times of weight.Other methods of weighting can be used.For example, each weight can be based on event Type and/or each weight can manually be configured by authenticated user (referring to fig. 4 for matching to weight The exemplary graphical user set).These weights can manually or automatically be configured.
Baseline profile 340 is the exemplary baseline profile of the single account for online service.According to one embodiment, often One account includes baseline profile, is used to determine " normal " behavior of account.In present example, baseline profile 340 is wrapped Include event information identical with baseline profile 310 is summarized.But compared with summarizing baseline profile 310, the thing of baseline profile 340 The frequency of the generation of part can be different.As shown, the generation percentage of event 1 and event 3 is identical, but event 2 It is different with the percentage of event 4.Compared with the generation of the event 2 in baseline profile 310, in baseline profile 340, event 2 generation percentage is bigger (10% comparison 5%).Compared with the generation of the event 4 in baseline profile 310, in baseline profile In 340, the generation percentage of event 4 is smaller (20% comparison 25%).As discussed herein, it can be used and single account Related baseline profile summarizes baseline profile to detect abnormal movement, and/or using one or more to detect abnormal movement.? Under some cases, newly created account does not have the baseline profile established.In such a case it is possible to which newly created account will be used for Newest profile from summarize profile or different accounts is compared, to detect abnormal movement.
Newest profile 370 is to be directed to the exemplary newest profile of the single account of online service.Newest profile can be with needle Summarizing for single account and/or account is created.In present example, newest profile 370 includes and summarizes baseline profile 310 identical event informations.Compared with summarizing baseline profile 310 and baseline profile 370, these events of newest profile 370 Incidence be different.Newest profile 370 is compared with any one in baseline profile (310,340), instruction should Account is abnormal activity.For example, the generation percentage of the event 2 in newest profile, compared with indicated by baseline profile 340 It is 2 times big, is 4 times big compared with summarizing indicated by baseline profile 310.
Fig. 4 shows the exemplary graphical user (GUI) for watching and configuring event related with abnormality detection. GUI shown in Fig. 4 is only intended to illustration purpose, rather than restrictive.
The first shown GUI is that event configuration 410 shows that it illustrates for selecting and configuring the thing to be monitored Part, to carry out the exemplary GUI of the abnormality detection of online service.Event 415 is partially illustrated can choose and is monitored Different types of event.Though it is shown that four kinds of event, but can also show many other event.According to one Embodiment can choose the type of each event and event that online service to be monitored, to use in abnormality detection. In present example, the event shown in event configuration 410 includes: account's log-in events, account management event, right As Access Events and tactful change event.As shown, user 430 selects account management event.
In response to receiving the selection of event (for example, account management event), show included in the event Each event more detailed view.In present example, account management event 420 is shown in selected account management The different event for including in event.According to one embodiment, user can choose or cancel the selected event of selection Individual case in type, to be included in abnormality detection.For example, user can choose account management event, then from Cancel a pair of of event in event used in abnormality detection.
Display 440 shows the exemplary display including event selector 442, and showing in abnormality detection can be with The list for the different event for configuring and using.In present example, user 450 has selected event 2.In response to having selected event 2, Show the more detailed view 460 of configuration.In present example, event 2 is shown as to be arranged to "ON", is indicated to thing Part 2 is monitored to carry out abnormality detection.In addition, user can also carry out close event by selecting ON/OFF user interface section 2.In addition, being provided with weight " 0.3 " also directed to event 2.According to one embodiment, authenticated user can configure different event Weighting, so that the event of Xiang Butong gives more weights when detecting abnormal movement.The default power for event can be set Weight.According to one embodiment, it sets the default weight for being used for each event to the frequency with the event in baseline profile Just it is inversely proportional.For example, the weight of its 1/.1=10 can be given if frequency of the event 1 in baseline profile is 10%. If frequency of the event 1 in baseline profile is 50%, the weight of its 1/.5=2 can be given.In addition, the specific calculating side Method is also possible to configurable.For example, weight can be square of frequency inverse, it is also possible to related other meters with the inverse Calculation value.
Fig. 5 shows the exemplary report of the abnormal movement of one or more accounts in the online service for showing detection It accuses.
Display 510 shows the illustrative report for being used to indicate the possibility abnormal movement of different accounts.Exception reporting 512 is It is shown as illustrative purpose, rather than it is restrictive.Can create and show many other types for showing exception Movable report.As shown, report 512 can be according to the abnormal movement from the abnormal movement of highest detection to lowest detection Sequentially, it is listed as searching a part of abnormal movement and monitored account.Exception reporting 512 show detect it is abnormal living Dynamic account.For example, carrying out normal operating and not detecting the account of abnormal movement, do not show in exception reporting Out.According to one embodiment, any account that value is greater than some predefined numerical value (threshold value) has potential abnormal movement.Root According to one embodiment, the value for being greater than the predefined numerical value (threshold value) is indicated: compared with the occurrence frequency for including in baseline profile, At least one event monitored currently more frequently occurs.In present example, user can choose shown account In one, to obtain the more information of the abnormal movement about the detection.As shown, user 520 is from exception reporting 512 Account 10 is selected to obtain the more detailed view of this account, as shown in display 540.
Display 540 is shown can be for the account for detecting abnormal movement, the example of the more detailed information shown. As shown, more detailed information shows the event of instruction abnormal movement and the baseline profile for these events.Aobvious Show in 540, two monitored different event is shown with abnormal movement.In present example, and normal feelings are regarded as Shape is compared, and five times (0.5 comparison 0.1) occurs for event 2.Compared with normal event occurs, event 3 usually occurs (0.2 pair twice Than 0.1).
Fig. 6 and Fig. 7 shows for using the account information from online service the process carried out abnormality detection.Work as reading When taking the discussion of routine given in this article, it should be appreciated that the logical operation of each embodiment is implemented as: (1) calculating The sequence of the computer implemented movement or program module that run in system, and/or the machine that (2) interconnect in computing systems are patrolled Collect circuit or circuit module.Implementation is selected dependent on the performance requirement for realizing computing system of the invention.Therefore, shown Out and the logical operation that constitutes embodiment described herein, differently refer into operation, structural devices, movement or mould Block.Can use software, firmware, specific use Digital Logic, with and combinations thereof realize these operations, structural devices, dynamic Work and module.Although these operations are shown in a particular order, according to implementation, thus it is possible to vary these operations it is suitable Sequence is performed in parallel these operations.
Fig. 6 is shown for by the way that baseline profile to be compared with newest profile, the exception detected in online service to be living Dynamic process 600.
After a start operation, which is moved to operation 610, accesses one or more baseline profiles in the case. The baseline profile can be the baseline profile for single account, and being also possible to the baseline profile summarized, (it includes coming to be somebody's turn to do The event information of more than one account of line service).It is wanted for example, each of online service tenant (tenant) can be directed to Each account of abnormal movement is monitored, all there is individual baseline profile.As described above, the baseline profile include from one or Multiple accounts generate, and indicate the event information of " normal " operation of account or some accounts.According to one embodiment, these Profile includes the related event information of security incident associated with one or more accounts of the online service.The event information It can be configured by authenticated user, and/or be automatically selected based on the monitored event of the on-line system.For example, Line service can automatically select all or part of monitored event or log event in the online service.
It circulates to operation 620, accesses newest profile.The newest profile includes the event letter obtained from newest a period of time Breath.Newest a period of time may include such as, but not limited to upper one hour, upper two hours, upper three hours, upper four small When, upper eight hours, one day etc. time cycle.According to one embodiment, newest profile includes coming upper six hours From the event information of one or more accounts.Newest profile may include the single account and/or the online clothes of the online service The account's of business summarizes.
It is transitioned into operation 630, baseline profile is compared with newest profile, it is living with the exception for detecting the online service It is dynamic.Different methods can be used, to execute newest profile compared with baseline profile.According to one embodiment, this compares packet It includes: determining between baseline profile and newest profile, when the frequency of one or more of event monitored is different 's.According to one embodiment, the significance level of the generation of event is adjusted using weighted factor.For example, being opened with an account The increase of quantity (it is the event with smaller weight) of form compare, can be by the quantity of the account of an account creation The instruction of abnormal movement is more regarded as in the increase of (it is the event with bigger weight).
It is moved to operation 640, movement can be executed based on abnormal movement detected.It can occur one or more dynamic Make.These movements executed are related to notifying detected abnormal movement to one or more users, and/or attempt to stop or The detected abnormal movement of limitation.For example, can create and deliver one or more reports (operation 650), it can be to one Or multiple accounts lock, so that stopping the following abnormal movement from one or more of accounts, can prevent one Or certain movements etc. occur for multiple accounts.
It circulates to operation 650, reports detected abnormal movement.In the presence of can be used for reporting abnormal movement it is a variety of not Same method.The final report of ranking is carried out to each account for example, can create according to detected abnormal movement, And it is delivered.These accounts are arranged according to the degree for being directed to account's abnormal movement detected according to one embodiment Name.Further, it is also possible to the more detailed report for each account be created, to be delivered and/or be watched.Implemented according to one Example, by selecting account in the final report of abnormal movement, to access more detailed report.
Then, process circulation is to end operation, and returns to handle other movements.
Fig. 7 shows the process 700 for configuring and storing the event information in baseline profile and newest profile.
After a start operation, process goes to operation 710, determines the event that monitor and use in abnormality detection.It can Automatically and/or manually to execute the determination.For example, not selecting each to be monitored event not instead of manually, examining When surveying abnormal movement, each event for currently monitoring and being loaded into log can be used.It gives one example again, be authorized use Family can choose the event to be monitored.The selection can substitute the event being being currently used in abnormality detection, or In addition to these events, the event of the selection is also used.According to one embodiment, it is shown that authenticated user is allowed to select different The GUI for the event that often monitor and use in detection.
It circulates to operation 720, configures the event for the abnormality detection for being used for the online service for determining.The configuration It may include manual configuration and automatically configure.For example, weight can be set in authenticated user, to carry out from different events Association.The weight of the event will be used for based on the time percentage that the event being monitored occurs according to one embodiment It is automatically set to different values.In this example embodiment, compared with the event usually less frequently occurred in online service, more frequently The event of generation is considered as not too important when detecting abnormal movement.For example, the event for creating account can compared with logining event To be given bigger weight.
It is transitioned into operation 730, configuration information is stored.The configuration information can be stored in one or more positions It sets.For example, the configuration information can be stored in the data-storing of online service, and/or it is stored in the outer of the online service In portion's data-storing.
It circulates to operation 740, obtains the event information of the different accounts from online service.According to one embodiment, from It records in the log of event information and obtains the event information, wherein different accounts are related to the online service for the event information Connection.The event information can automatically or manually be obtained.For example, can each hour, every two hours, it is six hours every, every It etc., to obtain the event information.Different accounts and different types of account can be monitored different to search Event.According to one embodiment, the operator account of online service is monitored, and the data from the monitoring are online Service is loaded into log.Further, it is also possible to be monitored to other types of account.For example, authenticated user can be configured to this The event of each account of online service is monitored, or the account of selection a subset is monitored.The event information It may include different types of information.For example, the event information may include such as, but not limited to following information: the class of event Type, the time of event generation, the result of the event etc..
It is transitioned into operation 750, updates profile using the event information.Can use the event information update one or Multiple profiles (for example, baseline profile and newest profile).Base according to one embodiment, to each account being monitored Line profile and newest profile are updated.Summarize baseline profile in addition, additionally providing and summarize newest profile.These summarize profile Including event information caused by more than one account.According to one embodiment, it includes online for this that these, which summarize profile, The account information of each account of the tenant (tenant) of service.For example, each serviced for online service is different Client maintains individually to summarize profile.As discussed, these different profiles can be used to detect the different of the online service Often activity.
Then, process circulation is to end operation, and returns, to handle other movements.
Fig. 8 shows the exemplary on-line system including abnormality detection.As shown, system 1000 include service 1010, Data-storing 1045 and touch-screen input device 1050 (for example, slate), smart phone 1030 and display apparatus 1080.
As shown, service 1010 be can be configured as offer such as productivity service (for example, electrical form, document, Presentation, chart, message etc.) etc service service based on cloud and/or based on enterprise.It can be used different types of Input/output is interacted with the service.For example, voice input, touch input, hardware based input can be used in user Etc..The function of one or more of service/application provided by service 1010 may be configured to based on client/clothes The application of business device.
As shown, service 1010 is multi-tenant (tenant) service, to any number of tenant (tenant) (example Such as, Tenant 1-N) resource 1015 and service are provided.Multi-tenant (tenant) service 1010 is service based on cloud, to pre- The tenant (tenant) for ordering the service provides resources/services 1015, maintains individual data for each tenant (tenant), And it carries out separating protection with other tenants (tenant) data.
System 1000 as shown in the figure includes touch-screen input device 1050 (for example, slate/ tablet device) and intelligence Phone 1030 is used to detect when to receive touch input (for example, finger touches or almost touch the touch screen).It can be with Use any kind of touch screen of the touch input of detection user.For example, touch screen may include for detecting touch input One or more layers capacitance-type material.Other than capacitance-type material or capacitance-type material is substituted, other biographies can be used Sensor.It is, for example, possible to use infrared ray (IR) sensors.According to one embodiment, touch screen be configured as detection with it is tangible The object or the object on tangible surface of surface contact.Although in this description using term " on ", but it should Understand, the orientation of the touch panel system is unrelated.Term " on " it is intended to be applicable to all these orientation.The touch Screen can be configured as the position (for example, starting point, intermediate point and end point) for determining and receiving touch input.It can be by appointing What mode appropriate (such as comprising it is coupled to the vibrating sensor or microphone of touch panel), to detect tangible surface Practical contact between object.For detecting the non-exhaustive listing of the example of the sensor of contact, comprising: based on pressure Device, the accelerometer of micro-machine, piezoelectric device, capacitance type sensor, resistance sensor and inductance type transducer.
According to one embodiment, smart phone 1030, touch-screen input device 1050 and equipment 1080 include application (1031、1051、1081)。
As shown, touch-screen input device 1050, smart phone 1030 and the display of display apparatus 1080 are for showing The exemplary interfaces 1052/1032/1082 of application used, and interface related with abnormality detection.Data can store In equipment (for example, smart phone 1030, slate 1050) and/or some other positions is stored in (for example, network data is deposited Storage is 1045).Data-storing 1045 (or some other storage) can be used and come storing data collection, event information, baseline letter Shelves, newest profile and other data.The application that these equipment use can be client-based application, based on server Using with it is based on cloud application and/or certain combination.According to one embodiment, display apparatus 1080 is such as coupling display The equipment of the MICROSOFT XBOX of device etc.
Anomaly detector 26 is configured as executing operation related with detection abnormal movement, as described herein.Although Anomaly detector 26 is shown located among service 1010, but the function of anomaly detector also may include in other positions (e.g., including on smart phone 1030 and/or slate equipment 1050 and/or equipment 1080).
Can be monitored in baseline profile and newest profile and including some exemplary events, including but not limited to: behaviour Make system starting;Operating system is closed;Local security mechanism (Local Security Authority) is loaded with certification packet;By Login process is trusted about local security institute registration;The internal resource for audit message queue distribution has been exhausted, has led to one The loss audited a bit;Security Account Manager is loaded with notice packet;The invalid use of port;Change system time;Monitoring Security incident mode has occurred;Administrator's recovery system from CrashOnAuditFail;Local security mechanism is loaded with safety Packet;Account successfully logs in;Account fails to log in;User/equipment advocates information;Account cancellation;User initiates to nullify;Using explicit Certificate carrys out logon attempt;Detect replay attack;Request the handle of an object;Modify registered value;Close the sentence of an object Handle;The handle of an object is requested with the intention of deletion;Delete an object;Request the handle of an object;About one Object executes operation;Access the trial of an object;Create the trial of hard link;It carries out in creation applications client Trial hereafter;An operation is attempted in one application;Delete an applications client context;Initialize an application;Change License about an object;The ordinal number of access block is attempted in one application;Special privilege is distributed to new login;Call privilege Service;Franchise object is attempted to operate;Secure identifier (SID) is filtered;Create new process;Exit one into Journey;Attempt the handle of one object of duplication;Request the dereference of an object;It attempts Backup Data and protects master key;It attempts Restore data protection master key;It attempts to protect the protected data that can audit;Attempt can audit protected data solution protection;Xiang Jin Journey distributes main token;Installation service in systems;Creation is deleted, is enabled, the task that disabling or update are scheduled;Distribution or Delete user right;Delete user right;Creation is directed to the new trust in a domain;Delete the trust for being directed to a domain;Change Kerberos strategy;Change the data recovery policy of encryption;Change the audit strategy about an object;Modify trusted domain letter Breath;Deletion system has secure access to an account authorization system secure access or from an account;Change system audit plan Slightly;Creation changes or enables user account;Attempt the password of change or resetting account;Trial resets account password;Prohibit With or delete user account;Delete user account;Creation changes or deletes the global group for enabling safety;To enabling safety Global group increases member, or the removing members from the global group for enabling safety;Delete, change or create the local for enabling safety Group;Increase member, or the removing members from local group of enabling safety to the local group of enabling safety;Change domain policy;Lock Determine user account;Creation changes or deletes computer account;Creation or change disable local group of safety;Pacify to disabling Complete local group increases member, or the removing members from local group of disabling safety;It deletes, creation or change disable safety Local group;Increase member, or the removing members from the global group of disabling safety to the global group of disabling safety;Delete disabling The global group of safety;Creation changes the common group for enabling safety;Increase member to the common group for enabling safety, or from opening With removing members in the common group of safety;Creation changes or deletes the common group for enabling safety;Increase to the common group of disabling safety Addition person, or the removing members from the common group of disabling safety;Delete the common group of disabling safety;Change set type;Xiang Yi A account increases SID history;It attempts to increase SID history to the account of failure;Unlock user account;Request kerberos authentication ticket According to;Request or regeneration Kerberos service ticket;The failure of Kerberos pre-authentication;The failure of kerberos authentication ticket requests; The request failure of Kerberos service ticket;An account is mapped to log in;One account not can be carried out mapping and log in;Domain control Device attempts the certificate of one account of verifying;Domain controller verifies the certificate failure of an account;Reconnect or disconnect one Session;Accesses control list is set on the account as the member of group of administrators;Change the title of account;Access the close of account Code Hash;Creation changes or deletes and applies group substantially;To basic application group increase member or from substantially using deleted in group at Member;Using group increase non-member or from substantially using deleting non-member in group to basic;Lightweight directory is deleted in creation Access protocol (LDAP) inquiry group;Call the Password Policy for checking API;It is close to attempt setting directory service reforestation practices administrator Code;Attempt the existence of the blank password of one account of inquiry;RPC detects that integrality violates, while carrying out to input message Decryption;Change and is arranged about the audit of object;It is identical that the central access strategy of proposal does not authorize Current central access strategy Access permission;Change the central access strategy about machine;Detect namespace conflicts;Increase, delete or modify by Trust forest information;Certificate manager refuses pending certificate request;Cert services receive the certificate request resubmited;Certificate Service revocation certificate;Cert services receive the request of publication Certificate Revocation Lists (CRL);Cert services issue certificate revocation column Table (CRL);Certificate request extension changes;One or more certificate request attributes change;Cert services receive the request of closing; Cert services backup starting is completed;Cert services are restored starting or are completed, and cert services start or stop;For certificate The security clearance of service changes;Cert services obtain filing key;Cert services input certificate to its database;It is taken for certificate The audit filter of business changes;Cert services receive certificate request;The request of cert services certificate of approval and sending certificate;Certificate Service-denial certificate request;Cert services set pending for the state of certificate request;Certificate manager for cert services Setting changes;Configuration entry in cert services changes;The attribute of cert services changes;Cert services file key; Cert services input and file key;Cert services issue CA certificate to Active Directory Domain Services;It is deleted from certificate database Except a line or multirow;Role is enabled to separate;Cert services load template;Update cert services template;Update cert services template Safety;Create every user's audit strategy table;Attempt registration security event source;It attempts to nullify security event source; CrashOnAuditFail value changes;Audit about object, which is arranged, to be changed;Modify specific group log form;For trust platform The local policy of infrastructure service (TBS), which is arranged, to be changed;Group policy for TBS, which is arranged, to be changed;The Resource Properties of object change;Often User, which audits to be arranged, to be changed;Central access strategy about object changes;It establishes, deletion or modification activity catalogue copy source are ordered Name context;Modification activity catalogue replicates purpose naming context;Beginning or the duplication of ending activity catalogue naming context Synchronization;Replicate the attribute of Active Directory Object;Duplication unsuccessfully starts or terminates;It is deleted from duplicate and delays object;When When firewall starts, strategy below is movable;When firewall starting, a kind of rule is listed;It makes an exception and arranges for firewall Table is changed, for example, adding, modifying or deleting rule;Firewall setting is reverted into default value;Firewall setting occurs Change;Ignore certain rule since firewall does not have the major version number of recognition rule;Since firewall does not interpret certain rule Then ignore the rule;The setting of firewall group policy changes;Firewall changes active profile;Firewall is not applied down The rule in face;Since the item of following rule invocation does not configure on that computer, and firewall does not apply the rule;It will Specific group is allocated to new login;Start the Internet protocol security (IPSec) service;Have disabled IPSec;IPSec service is met To potential serious failure;Establish ipsec main-mode security association;Establish ipsec main-mode security association;IPSec master Mode negotiation failure;Ipsec main-mode protocol negotiation failure;IPSec quick mode negotiates failure;IPSec holotype is closed safely It is coupled beam;IPSec, which has been abandoned, is grouped entering for integrity checking failure;IPSec has abandoned the entrance for making replay check failure Grouping;IPSec, which has been abandoned, should make safe entrance empty text packets;IPSec is received from remote computing device to be had not The grouping of correct Security Parameter Index (SPI);During holotype is negotiated, IPSec receives invalid negotiation packets;In Fast Modular During formula is negotiated, IPSec receives invalid negotiation packets;During mode of extension is negotiated, IPSec receives invalid negotiation Grouping;Establish ipsec main-mode and mode of extension security association;IPSec mode of extension negotiates failure, and the state of process It changes.
Further, it is also possible to be monitored to customization event.According to one embodiment, no matter when online service detects this The customization event of any user of online service, journal file just record these customization events.
Embodiment described herein and function can be operated via diversified computing system, these computing systems Including but not limited to: desk side computer system, wired and wireless computing system, mobile computing system (for example, mobile phone, on Net this, plate or slate type computer, notebook computer and laptop computer), hand-held type device, multiprocessor system System, the electronics based on microprocessor or programmable consumer electronics, microcomputer and mainframe computer.
In addition, embodiment described herein and function can be in distributed system (for example, computing systems based on cloud) Upper operation, wherein in this case, application function, memory, data storage and acquisition and various processing functions are in distribution It calculates on network (for example, internet or Intranet), is operated with being remotely located from each other.It can be aobvious via equipment is calculated on plate Show device or calculate the associated remote display unit of equipment via with one or more, to show various types of user interfaces And information.For example, can be shown various types of on the wall surface that various types of user interfaces and information are projected to User interface and information simultaneously interact.The interaction that the embodiment of the present invention can be carried out with diversified computing system, packet Include: keyboard input, touch screen input, voice or other audio inputs, gesture input are (when associated calculating equipment equipment is useful In capturing and explain user gesture, when detection (for example, camera) function to control the function of the calculating equipment) etc..
Fig. 9-11 and associated description provide begging for for the various operating environments that the embodiment of the present invention can be implemented By.But the equipment and system described referring to Fig. 9-11 and discussed are only intended to citing and illustration purpose, rather than limiting can With the calculating device configuration of numerous quantity for implementing embodiments of the invention described herein.
Fig. 9 is the frame for showing the physical assemblies (that is, hardware) for the calculating equipment 1100 that the embodiment of the present invention can be implemented Figure.Calculating apparatus assembly disclosed below may adapt to calculating equipment described above.In basic configuration, calculating is set Standby 1100 may include at least one processing unit 1102 and system storage 1104.Depending on calculating the configuration and class of equipment Type, system storage 1104 can include but is not limited to: volatile storage devices (for example, random access memory), non-volatile Property storage equipment (for example, read-only memory), any combination of flash memory or these memories.System storage 1104 can be with Including being suitable for runs software using the operating system 1105 of 1120 (for example, anomaly detectors 26) and one or more programs Module 1106.For example, operating system 1105 may adapt to the operation that control calculates equipment 1100.In addition, implementation of the invention Example can be realized in conjunction with shape library, other operating systems or any other application program, and be not limited to any specific Using or system.In Fig. 9, component shows the basic configuration those of in 1108 by a dotted line.Calculating equipment 1100 can be with With other feature or function.For example, calculate equipment 1100 can also include other data storage device (it is removable and/ Or irremovable), for example, disk, CD or tape.In Fig. 9, pass through movable memory equipment 1109 and irremovable storage Equipment 1110 shows this other storage equipment.
As described above, can store multiple program modules and data file in system storage 1104.When in processing unit When executing on 1102, program module 1106 (for example, anomaly detector 26) can be with implementation procedure, institute including but not limited in attached drawing One or more of stage of method and process shown.The other program moulds that can be used with embodiment according to the present invention Block may include that Email and contact application, text processing application, spreadsheet application, database application, lantern slide are answered With, draw or computer-assisted application program etc..
In addition, the embodiment of the present invention can include discrete electronic component, the encapsulation comprising logic gate or integrated electronic It is realized in chip, the electronic circuit using the circuit of microprocessor, or in the single core comprising electronic component or microprocessor On piece is realized.For example, the embodiment of the present invention can be via system on chip (SOC) Lai Shixian, wherein group shown in Fig. 9 Each of part is much desirably integrated on single IC for both.This SOC device may include one or more places Unit, graphic element, communication unit, system virtualization unit and various application functions are managed, it is all these all as single integrated Circuit integrates (or " firing ") to chip base.When via SOC to operate, retouched herein in regard to anomaly detector 26 The function of stating, can be dedicated on single IC for both (chip) via being integrated in together with the other components for calculating equipment 1100 Logic circuit operates.It is such as grasped with or with non-etc logic in addition, the embodiment of the present invention can also use to be able to carry out Other technologies (its include but is not limited to: machinery, light, the fluid and quantum techniques) Lai Shixian made.In addition, the embodiment of the present invention It can realize, can also be realized in any other circuit or system in general purpose computer.
Such as keyboard, mouse, pen, audio input device, touch input device etc. can also be had by calculating equipment 1100 Etc one or more input equipments 1112.In addition, it can include such as display, loudspeaker, printer etc. Output equipment 1114.Equipment above-mentioned is some examples, and other equipment can be used.Calculating equipment 1100 may include permitting Perhaps the one or more communication connections 1116 communicated with other calculating equipment 1118.The example of communication connection 1116 appropriate Son includes but is not limited to: RF transmitter, receiver and/or transceiver circuit;Universal serial bus (USB), parallel port and/or string Mouthful.
As used herein term " computer-readable medium " may include computer storage medium.Computer storage is situated between Matter may include utilizing any side of the information for storing such as computer readable instructions, data structure or program module etc Method or technology come realize volatile and non-volatile, removable and irremovable medium.System storage 1104 is moved and is deposited It stores up equipment 1109 and non-removable storage device 1110 is entirely the example of computer storage medium (that is, memory storage is set It is standby).Computer storage medium may include RAM, ROM, electricallyerasable ROM (EEROM) (EEPROM), flash memory or other memories Technology, CD-ROM, digital multi-purpose optical disc (DVD) or other optical storages, cassette tape, tape, disk storage or other magnetic Storage equipment or any other product that can be used in storing the information to be accessed by calculating equipment 1100.It is any this Computer storage medium can be a part for calculating equipment 1100.Computer storage medium do not include carrier waveform or its Its transmitting signal or the data-signal of modulation.
Communication media can pass through computer readable instructions, data structure, program module or the data-signal of modulation (example Such as, carrier waveform or other transmission mechanisms) in other data embody, including any information delivery media.Term be " modulation Data-signal " can describe that one or more characteristics are set or changed in the way of a kind of, so as to the information in this signal The signal encoded.Such as, but not limited to, communication media may include such as cable network or direct wired connection etc Wired medium, and the wireless medium of such as sound wave, radio frequency (RF), infrared ray and other wireless mediums etc.
Figure 10 A and Figure 10 B show the mobile computing device 1200 that the embodiment of the present invention can be implemented, for example, mobile Phone, smart phone, tablet personal computer, laptop computer etc..Referring to Figure 10 A, the figure shows for realizing this One embodiment of the mobile computing device 1200 of a little embodiments.In basic configuration, mobile computing device 1200 be have it is defeated Enter the handheld computer of unit and output unit.In general, mobile computing device 1200 includes display 1205 and one or more A input key 1210 allows user to input information to mobile computing device 1200.The display of mobile computing device 1200 1205 can also realize the function (for example, touch-screen display) of input equipment.If including, optional side input Unit 1215 allows other user to input.Side input unit 1215 can be rotary switch, key or any other class Type is manually entered unit.In alternate embodiments, mobile computing device 1200 can merge more or less input Unit.For example, in some embodiments, display 1205 can not be touch screen.In another alternate embodiment, mobile meter Calculating equipment 1200 is portable telephone system (e.g., cellular phone).Mobile computing device 1200 can also include optional small key Disk 1235." soft " keyboard that optional keypad 1235 can be physical keyboard or generate on touch-screen display.Each In a embodiment, output unit includes for showing the display 1205 of graphic user interface (GUI), visual detector 1220 (for example, Light-Emitting Diode) and/or audio-frequency transducer 1225 (for example, loudspeaker).In some embodiments, mobile computing device 1200 are associated with vibration transducer, to provide a user touch feedback.In another embodiment, mobile computing device 1200 closes And port is input and/or output, for example, audio input (e.g., microphone jack), audio output (e.g., earphone jack) and video It exports (e.g., the port HDMI), to send signal to external equipment or to receive signal from external equipment.
Figure 10 B is the block diagram for showing the framework of one embodiment of mobile computing device.That is, mobile computing device 1200 can be with combination system 1202 (that is, framework) to realize some embodiments.In one embodiment, system 1202 is implemented as One or more application can be run (for example, browser, Email, calendar, contact manager, information client side, game With media client/player) " smart phone ".In some embodiments, system 1202 is integrated into calculating equipment, such as Integrated personal digital assistant (PDA) and radio telephone.
One or more application program 1266 can be loaded into memory 1262, operate in operating system 1264 or Person is associated with operating system 1264.The example of these application programs includes dialing disc program, e-mail program, individual Information management (PIM) program, word processing program, spreadsheet program, internet browser program, messaging program etc..This Outside, system 1202 further includes the nonvolatile storage 1268 in memory 1262.Nonvolatile storage 1268 can be with For storing the permanent information that will not be lost in 1202 power down of system.Application program 1266 can be used and store non-volatile Information in property storage region 1268, for example, Email that e-mail applications use or other message etc..It synchronizes and answers It is also located in system 1202 with (not shown), is programmed to be handed over the respective synchronization application being located on host computer Mutually, to keep the information stored in nonvolatile storage 1268 synchronous with the corresponding information that host computer is stored.It answers When understanding, the other application including anomaly detector 26 as described herein can be loaded into memory 1262, and It operates on mobile computing device 1200.
System 1202 has power supply 1270, and wherein one or more battery may be implemented into the power supply 1270.Power supply 1270 It can also include external power supply, for example, AC adapter, either branch is docked in the power supply for being supplemented battery or being charged Seat.
In addition, system 1202 can also include radio device 1272, it is logical that the latter's execution sends and receives radio frequency The function of letter.Radio device 1272 facilitates via common carrier or service provider, Lai Shixian system 1202 and " outer Wireless connection between the world, portion ".It carries out under the control of operating system 1264 to and from radio device 1272 Transmission.In other words, the received communication of radio device 1272 can be broadcast to application program via operating system 1264 1266, vice versa.
Visual detector 1220, which may be used to provide visual notification and/or audio interface 1274, can be used for via audio Energy converter 1225 generates audible notice.In the embodiment illustrated, visual detector 1220 is light emitting diode (LED), audio-frequency transducer 1225 is loudspeaker.These equipment may be coupled directly to power supply 1270, so that when activating, they The duration indicated by informing mechanism is still maintained (even if processor 1260 and other components may be closed to save battery electricity Amount).LED can be programmed to be kept for the uncertain time, until user takes action to indicate the booting shape of the equipment State.Audio interface 1274 is for providing a user earcon and receiving earcon from user.For example, in addition to being coupled to audio Except energy converter 1225, audio interface 1274 is also coupled to microphone to receive audible input, such as promoting phone Session.According to an embodiment of the invention, microphone can function as audio sensor, it is such as following to promote the control to notice By description.In addition, system 1202 can also include video interface 1276, the latter starts the operation of onboard camera to record Static image, video flowing etc..
The mobile computing device 1200 of realization system 1202 can have other feature or function.For example, mobile computing Equipment 1200 can also include that the other data storage device of such as disk, CD or tape etc is (removable and/or can not It is mobile).In fig. 1 ob, this other storage equipment is shown by nonvolatile storage 1268.In addition, mobile meter Calculating equipment 1200 can also include peripheral device port 1230.
The data/information for being generated or being captured by mobile computing device 1200 and stored via system 1202, can be local Being stored on mobile computing device 1200 (as described above) or the data can store on any number of storage medium, Wherein the equipment can via radio device 1272 or via mobile computing device 1200 and with the mobile computing device 1200 associated independent calculating equipment (for example, server computer in the distributed computing network of such as internet etc) Between wired connection access these storage mediums.It should be understood that mobile computing device 1200 can be via radio Device 1272 accesses the data/information via distributed computing network.It similarly, can be according to well known data/letter It ceases transimission and storage unit (it includes Email and collaborative data/information shared system), is easy between computing devices Ground transmits the data/information, to be stored and to be used.
Figure 11 shows a kind of embodiment of the framework of exemplary system, as described above.It is developed with anomaly detector 26 Content, the content interacted with anomaly detector 26 or the content edited in association with anomaly detector 26, can be stored in In different communication channels or other storage classes.It is, for example, possible to use directory service 1322, Web portal 1324, mailbox clothes Business 1326, instant message storage 1328 or social network site 1330 store various documents.Anomaly detector 26 can make Realize that data are utilized with any one of system of these types or the like, as described herein.Server 1320 Anomaly detector 26 can be provided to client.It gives one example, server 1320 can be through WWW and provide exception The web server of detector 26.Server 1320 provides anomaly detector to client on the world wide web (www by network 1315 26.For example, client computing device can be implemented as calculating equipment 1100 and is embodied in personal computer, plate calculating In equipment 1310 and/or mobile computing device 1200 (for example, smart phone).Client computing device 1100,1310,1200 Any one of these embodiments can obtain the content from storage 1316.
For example, above with reference to the method, system and computer program product of embodiment according to the present invention block diagram and/or Operability explanation, to describe the embodiment of the present invention.Function action described in these frames can according to any process Order in a different order shown in figure occurs.For example, in fact can be substantially concurrent with two frames shown in conitnuous forms Ground executes or these frames can be executed sometimes with reverse order, depends on related function action.
The description and explanation of one or more embodiments provided in the application, it is not intended that limit in any way Or protection scope of the present invention that constraint such as claim is advocated.Embodiment provided in the application, example and details Be considered being enough to convey the ownership of the invention to being advocated, and enable other people manufacture and use advocated it is of the invention Optimal mode.The present invention advocated should not be construed as limited to any embodiment, example or details provided herein. It is either still individually shown and is described in a joint manner, various features (including structures and methods) are intended to by selectivity Ground includes or omits, to generate the embodiment with one group of special characteristic.After the description of the present application and explanation are provided, this Field those of ordinary skill is it is envisioned that fall into the modification within broader aspects of inventive concept embodied herein, modification And alternate embodiment, without departing from the wider protection scope of the invention advocated.

Claims (10)

1. a kind of method for detecting the abnormal movement in online service, comprising:
Access includes the baseline profile of past event information, and the past event information is related with multiple past events, wherein institute Stating each of multiple past events past event will originate from least one account of the online service;
Calculate the first past event frequency of the first past event, wherein the first past event frequency be relevant to it is described Other past events in multiple past events determine;
Calculate the second past event frequency of the second past event, wherein the second past event frequency be relevant to it is described Other past events in multiple past events determine;
Access includes the newest profile of up-to-date event information, the up-to-date event information and the account for being derived from the online service Up-to-date event it is related;
Calculate the first up-to-date event frequency of the first up-to-date event in the up-to-date event, wherein first up-to-date event Frequency is relevant to other up-to-date events to determine;
Calculate the second up-to-date event frequency of the second up-to-date event in the up-to-date event, wherein second up-to-date event Frequency is relevant to other up-to-date events to determine;
First past event is determined to occur compared to the higher frequency of first up-to-date event;
Second past event is determined to occur compared to the lower frequency of second up-to-date event;And
Generate report, wherein the report includes information about the following contents: first past event is compared to described the The higher frequency of one up-to-date event occurs with second past event to compare the lower frequency hair of second up-to-date event It is raw.
2. according to the method described in claim 1, wherein, the past event information and the up-to-date event information include described The security incident of online service.
3. according to the method described in claim 1, wherein, the newest profile includes: data related with activity from several The up-to-date event information occurred between hour to one day.
4. according to the method described in claim 1, wherein it is determined that first past event is to compare first up-to-date event Higher frequency occurs to include setting weight.
5. according to the method described in claim 1, further include receiving configuration information, the configuration information about: to monitoring And it is configured including the event in the newest profile and the baseline profile.
6. a kind of computer readable storage devices for being stored with computer executable instructions, the computer executable instructions when by The step of processor executes the processor for detecting the abnormal movement in online service, comprising:
Access includes the baseline profile of past event information related with the first type event and second species event, wherein institute State the account that each event in each event and the second species in the first type is derived from the online service;
It calculates between the generation of each event in first type and the generation of each event in the second species Ratio, to form bareline heart rate;
Access includes the newest profile of up-to-date event information related with up-to-date event, and the up-to-date event information is at upper one day Within be derived from the account of the online service, wherein the up-to-date event information includes more than first a events, wherein described Each event more than first in a event is classified as the first type event, wherein the up-to-date event information includes the A event more than two, wherein each event more than described second in a event is classified as the second species event;
It calculates between each event more than described first in a event and the generation of each event in more than second a event Ratio, to form up-to-date event frequency;
The bareline heart rate is compared with the up-to-date event frequency;
Determine that the bareline heart rate is different from the up-to-date event frequency;And
Report the instruction different from the up-to-date event frequency about the bareline heart rate.
7. a kind of system for detecting the abnormal movement in online service, comprising:
Processor and memory;
The operating environment executed using the processor;And
Anomaly detector is configured as executing the movement including the following terms:
Access includes the baseline profile of past event information related with the first type event and second species event, wherein institute State the account that each event in each event and the second species in the first type is derived from the online service;
The first type event is compared with the second species event to form bareline heart rate;
Access includes the newest profile of up-to-date event information, wherein and the up-to-date event information includes more than first a events, wherein Each event more than described first in a event is classified as the first type event, wherein the up-to-date event packet A event more than second is included, wherein each event more than described second in a event is classified as the second species event;
More than described first a events are compared with more than described second a events to form up-to-date event frequency;
The bareline heart rate is compared with the up-to-date event frequency;And
Abnormal activity is reported based on the comparison between the bareline heart rate and the up-to-date event frequency.
8. system according to claim 7, further includes: access system log, regularly with from the account of the online service Family obtains event information, and uses accessed information to update the baseline profile and the newest profile.
9. system according to claim 7, further includes: be included within each of event in the baseline profile with Weight is associated.
10. system according to claim 7, further includes:
It shows graphic user interface GUI, and receives from the GUI and the event is carried out to configure related configuration information.
CN201480069416.7A 2013-12-19 2014-12-11 Detecting anomalous activity from accounts of online services Active CN105874767B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14/134,575 2013-12-19
US14/134,575 US9210183B2 (en) 2013-12-19 2013-12-19 Detecting anomalous activity from accounts of an online service
PCT/US2014/069638 WO2015094873A1 (en) 2013-12-19 2014-12-11 Detecting anomalous activity from accounts of an online service

Publications (2)

Publication Number Publication Date
CN105874767A CN105874767A (en) 2016-08-17
CN105874767B true CN105874767B (en) 2019-03-26

Family

ID=52358974

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201480069416.7A Active CN105874767B (en) 2013-12-19 2014-12-11 Detecting anomalous activity from accounts of online services

Country Status (4)

Country Link
US (2) US9210183B2 (en)
EP (1) EP3085053A1 (en)
CN (1) CN105874767B (en)
WO (1) WO2015094873A1 (en)

Families Citing this family (155)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10346620B2 (en) * 2004-02-06 2019-07-09 Early Warning Service, LLC Systems and methods for authentication of access based on multi-data source information
US10015134B2 (en) * 2011-12-29 2018-07-03 Verisign, Inc. Methods and systems for creating new domains
US10015153B1 (en) * 2013-12-23 2018-07-03 EMC IP Holding Company LLC Security using velocity metrics identifying authentication performance for a set of devices
US9842027B1 (en) * 2013-12-27 2017-12-12 EMC IP Holding Company LLC Intelligent application optimized backups
US10264025B2 (en) 2016-06-24 2019-04-16 Varmour Networks, Inc. Security policy generation for virtualization, bare-metal server, and cloud computing environments
US10091238B2 (en) 2014-02-11 2018-10-02 Varmour Networks, Inc. Deception using distributed threat detection
JP5613855B1 (en) * 2014-04-23 2014-10-29 株式会社 ディー・エヌ・エー User authentication system
US9917851B2 (en) 2014-04-28 2018-03-13 Sophos Limited Intrusion detection using a heartbeat
US10122753B2 (en) * 2014-04-28 2018-11-06 Sophos Limited Using reputation to avoid false malware detections
US11017330B2 (en) 2014-05-20 2021-05-25 Elasticsearch B.V. Method and system for analysing data
US10140309B2 (en) * 2014-06-10 2018-11-27 Alfresco Software, Inc. File tracking on client machines synchronized with a content management system repository
US9591006B2 (en) * 2014-09-18 2017-03-07 Microsoft Technology Licensing, Llc Lateral movement detection
US9692748B2 (en) 2014-09-24 2017-06-27 Oracle International Corporation Unified provisioning of applications on devices in an enterprise system
US10530790B2 (en) * 2014-09-25 2020-01-07 Oracle International Corporation Privileged session analytics
US10482404B2 (en) * 2014-09-25 2019-11-19 Oracle International Corporation Delegated privileged access grants
WO2016064930A1 (en) * 2014-10-21 2016-04-28 Proofpoint, Inc. Systems and methods for application security analysis
US9705896B2 (en) * 2014-10-28 2017-07-11 Facebook, Inc. Systems and methods for dynamically selecting model thresholds for identifying illegitimate accounts
US10510081B2 (en) * 2014-10-30 2019-12-17 Unisys Corporation Cargo air waybill audit
GB201915196D0 (en) 2014-12-18 2019-12-04 Sophos Ltd A method and system for network access control based on traffic monitoring and vulnerability detection using process related information
US9973505B2 (en) 2015-01-14 2018-05-15 Samsung Electronics Co., Ltd. Method for controlling contents and electronic device thereof
WO2016118523A1 (en) * 2015-01-19 2016-07-28 InAuth, Inc. Systems and methods for trusted path secure communication
US10193929B2 (en) * 2015-03-13 2019-01-29 Varmour Networks, Inc. Methods and systems for improving analytics in distributed networks
EP3073718B1 (en) * 2015-03-27 2019-01-30 Deutsche Telekom AG Method for the individual prediction of the use and/or customisation of the use of a personalized telecommunication terminal to be operated by a user, telecommunication terminal, computer program and a computer program product
US9380027B1 (en) 2015-03-30 2016-06-28 Varmour Networks, Inc. Conditional declarative policies
CN106156149B (en) * 2015-04-14 2020-01-03 阿里巴巴集团控股有限公司 Data transfer method and device
US10701037B2 (en) 2015-05-27 2020-06-30 Ping Identity Corporation Scalable proxy clusters
CN106302603A (en) * 2015-06-05 2017-01-04 腾讯科技(深圳)有限公司 The method and apparatus remotely deleting information
JP6341150B2 (en) * 2015-07-09 2018-06-13 京セラドキュメントソリューションズ株式会社 Image forming apparatus and abnormality management system for image forming apparatus
US10313212B2 (en) * 2015-09-22 2019-06-04 Veniam, Inc. Systems and methods for detecting and classifying anomalies in a network of moving things
JP5933797B1 (en) * 2015-10-07 2016-06-15 株式会社ソリトンシステムズ Log information generating apparatus and program, and log information extracting apparatus and program
CA3004175A1 (en) * 2015-11-18 2017-05-26 Level 3 Communications, Llc Service activation system
US10191758B2 (en) 2015-12-09 2019-01-29 Varmour Networks, Inc. Directing data traffic between intra-server virtual machines
US10289693B2 (en) * 2015-12-30 2019-05-14 Dropbox, Inc. Techniques for providing user interface enhancements for online content management system version histories
US11100046B2 (en) * 2016-01-25 2021-08-24 International Business Machines Corporation Intelligent security context aware elastic storage
US9680852B1 (en) 2016-01-29 2017-06-13 Varmour Networks, Inc. Recursive multi-layer examination for computer network security remediation
US10659466B2 (en) * 2016-03-22 2020-05-19 Microsoft Technology Licensing, Llc Secure resource-based policy
US10366241B2 (en) * 2016-03-30 2019-07-30 The Privacy Factor, LLC Systems and methods for analyzing, assessing and controlling trust and authentication in applications and devices
US10284567B2 (en) * 2016-05-03 2019-05-07 Paypal, Inc. Targeted authentication queries based on detected user actions
US10104119B2 (en) * 2016-05-11 2018-10-16 Cisco Technology, Inc. Short term certificate management during distributed denial of service attacks
CN107515879B (en) * 2016-06-16 2021-03-19 伊姆西Ip控股有限责任公司 Method and electronic equipment for document retrieval
US10084802B1 (en) * 2016-06-21 2018-09-25 Palantir Technologies Inc. Supervisory control and data acquisition
US10554614B2 (en) * 2016-06-23 2020-02-04 Cisco Technology, Inc. Utilizing service tagging for encrypted flow classification
US10755334B2 (en) 2016-06-30 2020-08-25 Varmour Networks, Inc. Systems and methods for continually scoring and segmenting open opportunities using client data and product predictors
US10419931B1 (en) * 2016-08-25 2019-09-17 EMC IP Holding Company LLC Security for network computing environment using centralized security system
US10702744B2 (en) * 2016-09-07 2020-07-07 ATA IT Services LLC Fitness based control of communications device
US11660504B2 (en) * 2016-09-07 2023-05-30 ATA IT Services LLC Fitness based control of communication device
US10218719B2 (en) * 2016-09-21 2019-02-26 Apple Inc. Credential modification notifications
US10574700B1 (en) * 2016-09-30 2020-02-25 Symantec Corporation Systems and methods for managing computer security of client computing machines
US10915622B2 (en) * 2016-10-18 2021-02-09 Microsoft Technology Licensing, Llc Detecting local user security-related anomalies using active scans
US10587580B2 (en) 2016-10-26 2020-03-10 Ping Identity Corporation Methods and systems for API deception environment and API traffic control and security
US10191818B2 (en) * 2016-11-14 2019-01-29 Sap Se Filtered replication of data in distributed system of data centers
WO2018124672A1 (en) 2016-12-28 2018-07-05 Samsung Electronics Co., Ltd. Apparatus for detecting anomaly and operating method for the same
US10628590B2 (en) * 2017-01-24 2020-04-21 Salesforce.Com, Inc. Application security assessment
US10320800B2 (en) * 2017-03-13 2019-06-11 International Business Machines Corporation Fraud detection mechanism
US10986110B2 (en) 2017-04-26 2021-04-20 Elasticsearch B.V. Anomaly and causation detection in computing environments using counterfactual processing
US11621969B2 (en) 2017-04-26 2023-04-04 Elasticsearch B.V. Clustering and outlier detection in anomaly and causation detection for computing environments
US11783046B2 (en) * 2017-04-26 2023-10-10 Elasticsearch B.V. Anomaly and causation detection in computing environments
US10904289B2 (en) 2017-04-30 2021-01-26 Splunk Inc. Enabling user definition of custom threat rules in a network security system
US11032307B2 (en) * 2017-04-30 2021-06-08 Splunk Inc. User interface for defining custom threat rules in a network security system
US9882918B1 (en) 2017-05-15 2018-01-30 Forcepoint, LLC User behavior profile in a blockchain
US10129269B1 (en) 2017-05-15 2018-11-13 Forcepoint, LLC Managing blockchain access to user profile information
US10623431B2 (en) * 2017-05-15 2020-04-14 Forcepoint Llc Discerning psychological state from correlated user behavior and contextual information
US10943019B2 (en) 2017-05-15 2021-03-09 Forcepoint, LLC Adaptive trust profile endpoint
US10862927B2 (en) 2017-05-15 2020-12-08 Forcepoint, LLC Dividing events into sessions during adaptive trust profile operations
US10917423B2 (en) 2017-05-15 2021-02-09 Forcepoint, LLC Intelligently differentiating between different types of states and attributes when using an adaptive trust profile
US10999297B2 (en) 2017-05-15 2021-05-04 Forcepoint, LLC Using expected behavior of an entity when prepopulating an adaptive trust profile
US10447718B2 (en) 2017-05-15 2019-10-15 Forcepoint Llc User profile definition and management
US10999296B2 (en) 2017-05-15 2021-05-04 Forcepoint, LLC Generating adaptive trust profiles using information derived from similarly situated organizations
US10701094B2 (en) * 2017-06-22 2020-06-30 Oracle International Corporation Techniques for monitoring privileged users and detecting anomalous activities in a computing environment
US10264026B2 (en) * 2017-07-24 2019-04-16 Cyberark Software Ltd. Providing privileged access to non-privileged accounts
FR3069670A1 (en) * 2017-07-27 2019-02-01 Safran Identity and Security SOFTWARE FIREWALL
US11005892B2 (en) * 2017-09-17 2021-05-11 Allot Ltd. System, method, and apparatus of securing and managing internet-connected devices and networks
US12007941B2 (en) 2017-09-29 2024-06-11 Oracle International Corporation Session state tracking
EP4020282A1 (en) 2017-10-13 2022-06-29 Ping Identity Corporation Methods and apparatus for analyzing sequences of application programming interface traffic to identify potential malicious actions
US11979422B1 (en) * 2017-11-27 2024-05-07 Lacework, Inc. Elastic privileges in a secure access service edge
US10785190B2 (en) * 2017-12-13 2020-09-22 Adaptiv Networks Inc. System, apparatus and method for providing a unified firewall manager
US11438337B2 (en) * 2017-12-15 2022-09-06 Sap Se Multi-tenant support user cloud access
CN108133373A (en) * 2018-01-04 2018-06-08 交通银行股份有限公司 Seek the method and device for the adventure account for relating to machine behavior
US10860664B2 (en) 2018-03-19 2020-12-08 Roblox Corporation Data flood checking and improved performance of gaming processes
US10388286B1 (en) * 2018-03-20 2019-08-20 Capital One Services, Llc Systems and methods of sound-based fraud protection
US10915587B2 (en) 2018-05-18 2021-02-09 Google Llc Data processing system for generating entries in data structures from network requests
US10867044B2 (en) * 2018-05-30 2020-12-15 AppOmni, Inc. Automatic computer system change monitoring and security gap detection system
US10887446B2 (en) 2018-06-01 2021-01-05 T-Mobile Usa, Inc. Detecting nuisance and restricted communications via a communication privilege control system
US10467310B1 (en) * 2018-06-02 2019-11-05 Romit Dey Selective online content removal based on activity history
US11218297B1 (en) * 2018-06-06 2022-01-04 Tripwire, Inc. Onboarding access to remote security control tools
RU2708355C1 (en) * 2018-06-29 2019-12-05 Акционерное общество "Лаборатория Касперского" Method of detecting malicious files that counteract analysis in isolated environment
US11017076B2 (en) * 2018-08-08 2021-05-25 Microsoft Technology Licensing, Llc Enhancing security using anomaly detection
US11165776B2 (en) * 2018-08-28 2021-11-02 International Business Machines Corporation Methods and systems for managing access to computing system resources
US10938853B1 (en) * 2018-08-29 2021-03-02 Amazon Technologies, Inc. Real-time detection and clustering of emerging fraud patterns
US10942863B2 (en) 2018-08-30 2021-03-09 Micron Technology, Inc. Security configurations in page table entries for execution domains using a sandbox application operation
US11500665B2 (en) 2018-08-30 2022-11-15 Micron Technology, Inc. Dynamic configuration of a computer processor based on the presence of a hypervisor
US11182507B2 (en) * 2018-08-30 2021-11-23 Micron Technology, Inc. Domain crossing in executing instructions in computer processors
US11481241B2 (en) 2018-08-30 2022-10-25 Micron Technology, Inc. Virtual machine register in a computer processor
US11914726B2 (en) 2018-08-30 2024-02-27 Micron Technology, Inc. Access control for processor registers based on execution domains
US11562315B2 (en) * 2018-08-31 2023-01-24 Accenture Global Solutions Limited Detecting an issue related to a report
US10999135B2 (en) * 2018-09-19 2021-05-04 Google Llc Fast provisioning in cloud computing environments
CN110431580B (en) * 2018-11-30 2023-05-16 创新先进技术有限公司 Using random numbers tables to reduce concurrent blockchain transaction failures
US11675902B2 (en) * 2018-12-05 2023-06-13 Vmware, Inc. Security detection system with privilege management
US11188661B2 (en) * 2018-12-12 2021-11-30 Sap Se Semi-rule based high performance permission management
GB201820853D0 (en) 2018-12-20 2019-02-06 Palantir Technologies Inc Detection of vulnerabilities in a computer network
US11681710B2 (en) * 2018-12-23 2023-06-20 Microsoft Technology Licensing, Llc Entity extraction rules harvesting and performance
EP3678348A1 (en) 2019-01-04 2020-07-08 Ping Identity Corporation Methods and systems for data traffic based adpative security
US11140182B2 (en) 2019-01-11 2021-10-05 Optum, Inc. Predictive anomaly handling in a service provider system
CN109817347A (en) * 2019-01-15 2019-05-28 深圳市道通科技股份有限公司 Inline diagnosis platform, its right management method and Rights Management System
US11210407B2 (en) * 2019-01-25 2021-12-28 V440 Spó£Ka Akcyjna Electronic communications device and messaging application therefor
US11102187B2 (en) * 2019-02-20 2021-08-24 Aetna Inc. Systems and methods for managing workflow transactions including protected personal data in regulated computing environments
US11283827B2 (en) * 2019-02-28 2022-03-22 Xm Cyber Ltd. Lateral movement strategy during penetration testing of a networked system
US11570213B2 (en) * 2019-04-03 2023-01-31 Cisco Technology, Inc. Collaborative security for application layer encryption
US11151576B2 (en) 2019-04-05 2021-10-19 At&T Intellectual Property I, L.P. Authorizing transactions using negative pin messages
US11126713B2 (en) * 2019-04-08 2021-09-21 Microsoft Technology Licensing, Llc Detecting directory reconnaissance in a directory service
US10997295B2 (en) 2019-04-26 2021-05-04 Forcepoint, LLC Adaptive trust profile reference architecture
US11863580B2 (en) 2019-05-31 2024-01-02 Varmour Networks, Inc. Modeling application dependencies to identify operational risk
US11310284B2 (en) 2019-05-31 2022-04-19 Varmour Networks, Inc. Validation of cloud security policies
US11711374B2 (en) 2019-05-31 2023-07-25 Varmour Networks, Inc. Systems and methods for understanding identity and organizational access to applications within an enterprise environment
US11290493B2 (en) 2019-05-31 2022-03-29 Varmour Networks, Inc. Template-driven intent-based security
US11290494B2 (en) 2019-05-31 2022-03-29 Varmour Networks, Inc. Reliability prediction for cloud security policies
US11575563B2 (en) 2019-05-31 2023-02-07 Varmour Networks, Inc. Cloud security management
US11226983B2 (en) * 2019-06-18 2022-01-18 Microsoft Technology Licensing, Llc Sub-scope synchronization
US11316851B2 (en) 2019-06-19 2022-04-26 EMC IP Holding Company LLC Security for network environment using trust scoring based on power consumption of devices within network
US11343257B2 (en) * 2019-06-27 2022-05-24 Microsoft Technology Licensing, Llc Extended domain platform for nonmember user account management
US11329987B2 (en) * 2019-07-08 2022-05-10 Bank Of America Corporation Protecting enterprise computing resources by implementing an optical air gap system
US11027196B2 (en) * 2019-09-04 2021-06-08 Take-Two Interactive Software, Inc. System and method for managing transactions in a multiplayer network gaming environment
US11936739B2 (en) * 2019-09-12 2024-03-19 Oracle International Corporation Automated reset of session state
US11461484B2 (en) 2019-12-30 2022-10-04 Imperva, Inc. Capturing contextual information for data accesses to improve data security
US20210233081A1 (en) * 2020-01-27 2021-07-29 Visa International Service Association Embedding inferred reaction correspondence from decline data
US11455532B2 (en) * 2020-03-18 2022-09-27 Optum Services (Ireland) Limited Single point facility utility sensing for monitoring welfare of a facility occupant
US11410178B2 (en) 2020-04-01 2022-08-09 Mastercard International Incorporated Systems and methods for message tracking using real-time normalized scoring
US11715106B2 (en) 2020-04-01 2023-08-01 Mastercard International Incorporated Systems and methods for real-time institution analysis based on message traffic
US11023607B1 (en) * 2020-04-03 2021-06-01 Imperva, Inc. Detecting behavioral anomalies in user-data access logs
CN111553700B (en) * 2020-05-07 2023-03-21 支付宝(杭州)信息技术有限公司 Payment risk identification method and device
US11676368B2 (en) 2020-06-30 2023-06-13 Optum Services (Ireland) Limited Identifying anomalous activity from thermal images
US11379775B2 (en) * 2020-07-14 2022-07-05 BankCard Services, LLC Computer-based information management system configured for automated and dynamic account analysis and methods thereof
US11321157B2 (en) * 2020-08-31 2022-05-03 Northrop Grumman Systems Corporation Method of operating a digital system operable in multiple operational states and digital system implementing such method
US11522863B2 (en) * 2020-10-29 2022-12-06 Shopify Inc. Method and system for managing resource access permissions within a computing environment
US12088583B2 (en) * 2020-11-11 2024-09-10 Hewlett Packard Enterprise Development Lp Permissions for backup-related operations
WO2022120840A1 (en) * 2020-12-11 2022-06-16 Beijing Didi Infinity Technology And Development Co., Ltd. Systems and methods for improving security
US11818152B2 (en) 2020-12-23 2023-11-14 Varmour Networks, Inc. Modeling topic-based message-oriented middleware within a security system
US11876817B2 (en) 2020-12-23 2024-01-16 Varmour Networks, Inc. Modeling queue-based message-oriented middleware relationships in a security system
US11943235B2 (en) 2021-01-04 2024-03-26 Saudi Arabian Oil Company Detecting suspicious user logins in private networks using machine learning
US11777978B2 (en) 2021-01-29 2023-10-03 Varmour Networks, Inc. Methods and systems for accurately assessing application access risk
US12050693B2 (en) 2021-01-29 2024-07-30 Varmour Networks, Inc. System and method for attributing user behavior from multiple technical telemetry sources
US11785015B2 (en) * 2021-02-24 2023-10-10 Bank Of America Corporation Information security system for detecting unauthorized access requests
US11941155B2 (en) 2021-03-15 2024-03-26 EMC IP Holding Company LLC Secure data management in a network computing environment
US11895133B2 (en) * 2021-04-05 2024-02-06 Bank Of America Corporation Systems and methods for automated device activity analysis
US11716340B2 (en) * 2021-05-28 2023-08-01 Microsoft Technology Licensing, Llc Threat detection using cloud resource management logs
US12010125B2 (en) * 2021-06-29 2024-06-11 Microsoft Technology Licensing, Llc Anomaly detection in an application with delegate authorization
US11546769B1 (en) * 2021-06-30 2023-01-03 Fortinet, Inc. NGFW (next generation firewall) security inspection over multiple sessions of message session relay protocol (MSRP) on a data communication network
US11734316B2 (en) 2021-07-08 2023-08-22 Varmour Networks, Inc. Relationship-based search in a computing environment
US11829509B2 (en) * 2021-07-15 2023-11-28 AVAST Software s.r.o. Data exfiltration detection
KR102369960B1 (en) * 2021-07-30 2022-03-04 쿠팡 주식회사 Electronic apparatus for providing information based on existence of a user account and method thereof
WO2023069213A1 (en) * 2021-10-20 2023-04-27 Visa International Service Association Method, system, and computer program product for auto-profiling anomalies
US11748374B2 (en) * 2021-11-30 2023-09-05 Snowflake Inc. Replication group objects configuration in a network-based database system
US20230269262A1 (en) * 2022-02-24 2023-08-24 Microsoft Technology Licensing, Llc Detecting mass control plane operations
US20230267198A1 (en) * 2022-02-24 2023-08-24 Microsoft Technology Licensing, Llc Anomalous behavior detection with respect to control plane operations
WO2024144778A1 (en) * 2022-12-29 2024-07-04 Varonis Systems, Inc. Indicators of compromise of access

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004104780A2 (en) * 2003-05-15 2004-12-02 Caslin Michael F Method and system for providing fraud detection for remote access services
CN102694696A (en) * 2012-05-14 2012-09-26 中国科学院计算机网络信息中心 Method and device for anomaly detection of DNS (domain name system) server

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5819226A (en) * 1992-09-08 1998-10-06 Hnc Software Inc. Fraud detection using predictive modeling
US20040185830A1 (en) * 1996-08-08 2004-09-23 Joao Raymond Anthony Apparatus and method for providing account security
US20080275820A1 (en) * 2000-01-21 2008-11-06 Raymond Anthony Joao Apparatus and method for providing account security
US20080010678A1 (en) * 2004-09-17 2008-01-10 Jeff Burdette Authentication Proxy
US8832048B2 (en) 2005-12-29 2014-09-09 Nextlabs, Inc. Techniques and system to monitor and log access of information based on system and user context using policies
US20070289013A1 (en) 2006-06-08 2007-12-13 Keng Leng Albert Lim Method and system for anomaly detection using a collective set of unsupervised machine-learning algorithms
US8036967B2 (en) * 2007-01-12 2011-10-11 Allegacy Federal Credit Union Bank card fraud detection and/or prevention methods
US8234240B2 (en) 2007-04-26 2012-07-31 Microsoft Corporation Framework for providing metrics from any datasource
WO2008134039A1 (en) * 2007-04-27 2008-11-06 Total System Services, Inc. Method and system for detecting fraud in financial transactions
US9727440B2 (en) 2007-06-22 2017-08-08 Red Hat, Inc. Automatic simulation of virtual machine performance
US8121962B2 (en) * 2008-04-25 2012-02-21 Fair Isaac Corporation Automated entity identification for efficient profiling in an event probability prediction system
US8230269B2 (en) 2008-06-17 2012-07-24 Microsoft Corporation Monitoring data categorization and module-based health correlations
US8090648B2 (en) * 2009-03-04 2012-01-03 Fair Isaac Corporation Fraud detection based on efficient frequent-behavior sorted lists
US9397979B2 (en) 2009-04-22 2016-07-19 Hewlett Packard Enterprise Development Lp Router method and system
US20120137367A1 (en) 2009-11-06 2012-05-31 Cataphora, Inc. Continuous anomaly detection based on behavior modeling and heterogeneous information analysis
US8904241B2 (en) 2011-07-27 2014-12-02 Oracle International Corporation Proactive and adaptive cloud monitoring
US20120016633A1 (en) * 2010-07-16 2012-01-19 Andreas Wittenstein System and method for automatic detection of anomalous recurrent behavior
US9710857B2 (en) * 2010-11-19 2017-07-18 Sap Se Detecting anomalous user activity
US8646073B2 (en) 2011-05-18 2014-02-04 Check Point Software Technologies Ltd. Detection of account hijacking in a social network
US8881289B2 (en) * 2011-10-18 2014-11-04 Mcafee, Inc. User behavioral risk assessment
US9106687B1 (en) * 2011-11-01 2015-08-11 Symantec Corporation Mechanism for profiling user and group accesses to content repository
US8745216B2 (en) 2011-11-17 2014-06-03 Infosys Limited Systems and methods for monitoring and controlling a service level agreement
EP2880820A4 (en) * 2012-07-31 2016-03-23 Hewlett Packard Development Co Pattern consolidation to identify malicious activity
US9166993B1 (en) * 2013-07-25 2015-10-20 Symantec Corporation Anomaly detection based on profile history and peer history
US9558347B2 (en) * 2013-08-27 2017-01-31 Globalfoundries Inc. Detecting anomalous user behavior using generative models of user actions

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004104780A2 (en) * 2003-05-15 2004-12-02 Caslin Michael F Method and system for providing fraud detection for remote access services
CN102694696A (en) * 2012-05-14 2012-09-26 中国科学院计算机网络信息中心 Method and device for anomaly detection of DNS (domain name system) server

Also Published As

Publication number Publication date
CN105874767A (en) 2016-08-17
US9210183B2 (en) 2015-12-08
WO2015094873A1 (en) 2015-06-25
EP3085053A1 (en) 2016-10-26
US20150180894A1 (en) 2015-06-25
US20160080406A1 (en) 2016-03-17

Similar Documents

Publication Publication Date Title
CN105874767B (en) Detecting anomalous activity from accounts of online services
US11941089B2 (en) Pairing devices to prevent digital content misuse
US8881249B2 (en) Scalable and automated secret management
US9825956B2 (en) Systems and methods for access permission revocation and reinstatement
US20170237729A1 (en) Securing user-accessed applications in a distributed computing environment
US10158670B1 (en) Automatic privilege determination
CN104838630B (en) Application program management based on strategy
CN102947797B (en) The online service using directory feature extending transversely accesses and controls
US11948196B2 (en) Asset management techniques
CN103620615A (en) Access control architecture
CN103632082A (en) Universal permission management system and universal permission management method
US9729552B2 (en) Access violation mitigation system
CN112818335A (en) Method for managing and controlling safe operation and maintenance of privileged account
US10965551B2 (en) Secure count in cloud computing networks
US20190354352A1 (en) Facilitation of microservice user interface framework
WO2017114210A1 (en) Apparatus and method for security control of data processing system
CN103778379B (en) Application in management equipment performs and data access
CN106933605A (en) A kind of intelligent progress recognizing control method and system
US8155275B1 (en) Systems and methods for managing alarms from recorders
WO2002067173A9 (en) A hierarchy model
Camilleri Data security in cloud-centric multi-tenant databases
AU2002245006B2 (en) A hierarchy model
Mudiyanselage BACHELOR THESIS ASSIGNMENT
AU2002245006A1 (en) A hierarchy model

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant